Incremental deterministic public-key encryption
From MaRDI portal
Publication:1747660
DOI10.1007/s00145-017-9252-1zbMath1421.94064OpenAlexW2606514712WikidataQ121243165 ScholiaQ121243165MaRDI QIDQ1747660
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
Publication date: 26 April 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9252-1
Related Items
Updatable all-but-one dual projective hashing and its applications, CCA-security from adaptive all-but-one lossy trapdoor functions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Randomness is linear in space
- More constructions of lossy and correlation-secure trapdoor functions
- Message-Locked Encryption for Lock-Dependent Messages
- A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
- Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More
- Incremental Unforgeable Encryption
- Lossy Trapdoor Functions and Their Applications
- How to fool an unbounded adversary with a short key
- Circular-Secure Encryption from Decision Diffie-Hellman
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Hedged Public-Key Encryption: How to Protect against Bad Randomness
- A Pseudorandom Generator from any One-way Function
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- Message-Locked Encryption and Secure Deduplication
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- Theory of Cryptography
- Cryptography in $NC^0$
- Public-Key Cryptosystems Resilient to Key Leakage